QUESTION 76To restore a qtree protected with SnapVault from the secondary storage system to the primary storage system, you can ______________. (Choose two.)

A. restore to a non existing qtree with DOT 7. 2B. add the new qtree to the primary storage system with DOT 7.2C. overwrite the existing qtree on the primary storage system with DOT 7.3D. delete the existing qtree from the secondary storage system with DOT 7.3

Answer: AC

QUESTION 77The snapvault update command is only available on the secondary system.

A. TrueB. False

Answer: A

QUESTION 78The OSSV agent on the primary system listens to TCP port 10000 for all SnapVault communications.

A. TrueB. False

Answer: A

QUESTION 79What security mechanism can an administrator use on an OSSV client to set permissions allowing backups to a SnapVault secondary system?

A. SnapMirror supports SnapLock volumes.B. There are two types of SnapLock volumes.C. SnapLock volumes support per-file retention periods.D. In Data ONTAP 7.2.5.1 and later, SnapLock Compliance volumes are not supported on the V-Series controller with NetApp Storage.

Answer: ABC

QUESTION 82Which iSCSI security method encrypts data between the initiator and the target?

QUESTION 87You are troubleshooting a clustered failover problem at a customer site. The customer explains that both storage systems were NFS mounted onto the Solaris host. While in takeover mode, you attempt to create a file on the NFS mount point for the inaccessible system, but you get the following error:NFS server filer2 not responding still trying.When not in takeover mode, both storage systems operate normally and you do not get the error. You perform a “cf giveback” and you can now create a file over NFS on both systems. What should you do first to resolve this issue?

A. Replace the NIC adapter.B. Submit a new bug report.C. Use the cluster-config-checker.cgi to identify the problem and corrective action.D. Replace the cluster interconnect card and run diagnostics “all” to ensure proper system operation.

Answer: C

QUESTION 88Each storage system in a cluster must have network access to the __________.

QUESTION 89One method of configuring an interface for takeover is to enter ifconfig interface partner address at the command line. To make this configuration persistent across reboots, you must enter this information in the _____ file for each system.

A. /etc/rcB. /etc/hostsC. /vol/vol0/homeD. /vol/vol0/mount

Answer: A

QUESTION 90What is the maximum distance between a standard clustered pair at 2Gbps?